Show simple item record

Bánáti, Anna
2025-08-11T07:44:45Z
2025-08-11T07:44:45Z
2025
1785-8860hu_HU
http://hdl.handle.net/20.500.14044/32126
The number of cybersecurity attacks and sensitive data breaches in businesses and organizations has increased significantly in recent years, and companies that are increasingly using or providing 5G technology are no exception. The impact of these incidents not only results the sensitive data breaches, financial losses and unexpected operational patterns for the targeted companies or organizations but can also extend to their peers in the same industry. Therefore, prevention and early detection of cyberattacks is also a key issue for IT infrastructures extended with emerging 5G technology. At the same time, detecting different types of attacks has become extremely challenging as attacks have become more sophisticated, distributed and stealthy with the help of artificial intelligence and other modern technologies. Detecting and managing such attacks requires sophisticated intrusion detection systems running on high-performance hardware and managed by expert security personnel. However, these resources are expensive to deploy, especially for small and medium-sized enterprises (SMEs). Therefore, in many cases, open source and free solutions are needed that allow SMEs to operate a security information event management (SIEM) system. Thanks to the low cost of implementation, it is affordable for SMEs and, after a short configuration and learning phase, it is self-sufficient and stable. Our goal is to provide detection solutions for attacks and vulnerabilities specific to 5G networks that provide effective detection and response for open source SIEM systems. Alerts on detected anomalies notify security personnel, who can efficiently and quickly implement incident response through graphical and visual dashboards.hu_HU
dc.formatPDFhu_HU
enhu_HU
Developing Security Information and Events Management Use Cases for 5G Specific Vulnerabilities and Attackshu_HU
Open accesshu_HU
Óbudai Egyetemhu_HU
Budapesthu_HU
Óbudai Egyetemhu_HU
Műszaki tudományok - informatikai tudományokhu_HU
5G networkshu_HU
vulnerabilityhu_HU
attack detectionhu_HU
SIEMhu_HU
Tudományos cikkhu_HU
Acta Polytechnica Hungaricahu_HU
local.tempfieldCollectionsFolyóiratcikkekhu_HU
10.12700/APH.22.2.2025.2.7
Kiadói változathu_HU
25 p.hu_HU
2. sz.hu_HU
22. évf.hu_HU
2025hu_HU
Óbudai Egyetemhu_HU


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record